Full service web hosting, great prices and support. Starts at $1.99/month!
Page 1 of 2 12 LastLast
Results 1 to 10 of 14

Thread: Re: Security Patch

  1. #1
    loba
    Guest


    Default Re: Security Patch

    Hi,

    I just recieved an email asking me to patch up the BTS files by replacing certain code, and i realised that my code was a bit different from the one listed...

    code found in my oscmax -->
    e.g.
    <?php if ($javascript) { require(DIR_WS_JAVASCRIPT . $javascript); } ?>

    code that was supposed to be replaced -->
    e.g.
    <?php if ($_javascript) { require(DIR_WS__JAVASCRIPT . $_javascript); } ?>

    Should i be replacing the code since i couldnt find any code the resembles that except for the one i showed? or should i remove the underscore?

  2. #2
    osCMax Developer


    Re: Security Patch


    Join Date
    Jul 2002
    Location
    Phoenix, AZ
    Posts
    23,134
    Contribute If you enjoy reading the
    content here, click the below
    image to support our site.
    Click Here To Contribute To Our Site

    Total Contributions For

    michael_s     $ 10.00
    Rep Power
    598


    Default RE: Re: Security Patch

    Hi,

    Give it a try and replace them. It should not matter. If you run into problems, come back and let me know.

  3. #3
    loba
    Guest


    Default RE: Re: Security Patch

    ok thanks mate!

  4. #4
    paulM
    Guest


    Default RE: Re: Security Patch

    Hi msasek,

    thanks for the security update!

    I'm not sure how the exploit exactly works, but would you agree that this vulnerability would not have existed if register_globals would be off? (and the script would have been register_globals off compatible of course)

    Paul

  5. #5
    bdneuman
    Guest


    Default

    msasek:

    Can you give me an idea of how this code can be exploited?

    I have and continue to modify my site w/ contrib's as well as my own tweaks (including added javascripts). I would just like to have an idea of what to look out for to avoid unknowingly opening up another security leak as I am editing the code.

    Thanks in advance for the info.

  6. #6
    dreamscape
    Guest


    Default Re: RE: Re: Security Patch

    Quote Originally Posted by paulM
    I'm not sure how the exploit exactly works, but would you agree that this vulnerability would not have existed if register_globals would be off? (and the script would have been register_globals off compatible of course)
    Hi Paul. Your intuition is correct. This exploit and the vast majority of exploits for osCommerce and its contributions only work because they exploit the scripts reliance on register_globals.

    I'm not sure why the OSC team did not make MS2 register_globals OFF compatible (or better yet require that it be off). It is actually not that difficult to do. Not to bash the team or anything, but over the years it has become pretty apparent that security is not among their top concerns.

  7. #7
    swdave
    Guest


    Default

    I recommend you put an .htaccess file in the templates directory to deny direct access to any php files and then define in application_top any variables used by the template code.

    //Protection application_top
    $javascript = '';
    $content = '';
    $content_template = '';
    $boxLink = '';
    etc...

    .httaccess in templates dir

    <Files *.php>
    Order Deny,Allow
    Deny from all
    </Files>

  8. #8
    bdneuman
    Guest


    Default

    Quote Originally Posted by swdave
    I recommend you put an .htaccess file in the templates directory to deny direct access to any php files and then define in application_top any variables used by the template code.

    //Protection application_top
    $javascript = '';
    $content = '';
    $content_template = '';
    $boxLink = '';
    etc...

    .httaccess in templates dir

    <Files *.php>
    Order Deny,Allow
    Deny from all
    </Files>
    Michael?

  9. #9
    paulM
    Guest


    Default

    Quote Originally Posted by bdneuman
    Michael?
    I'm not Michael, but I quite sure he will agree with swdave's ideas Actually it's very likely that the next BTS version will include exactly that security improvements.

    Also it seems wise to add the .htaccess file (as above) to most other osC folders that don't need direct access too.

  10. #10
    bdneuman
    Guest


    Default

    Quote Originally Posted by paulM
    Quote Originally Posted by bdneuman
    Michael?
    I'm not Michael, but I quite sure he will agree with swdave's ideas Actually it's very likely that the next BTS version will include exactly that security improvements.

    Also it seems wise to add the .htaccess file (as above) to most other osC folders that don't need direct access too.
    Forgive my noviceness, but you just put the variable in application_top to make the initial definition? Do you remove any of the variables from the various templates files then?

Page 1 of 2 12 LastLast

Similar Threads

  1. osCMax 2.0RC2 Security Patch/Update 051112
    By wilde-uk in forum osCmax v2 Installation issues
    Replies: 5
    Last Post: 04-12-2006, 07:45 PM
  2. Blank default page after did the security patch
    By alphaque in forum osCmax v2 Installation issues
    Replies: 6
    Last Post: 03-27-2006, 02:35 AM
  3. Security Patch osCMax 2.0RC2
    By warrenthewindmill in forum osCmax v1.7 Discussion
    Replies: 2
    Last Post: 12-04-2005, 10:50 AM
  4. osCMax 2.0RC2 Security Patch/Update 051112
    By michael_s in forum Announcements
    Replies: 0
    Last Post: 11-27-2005, 10:12 AM
  5. Security patch killed pop-up function
    By bjrafferty in forum osCmax v1.7 Discussion
    Replies: 2
    Last Post: 03-24-2005, 01:13 PM

Bookmarks

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •